Search
.Management Sciences
A. -t
B. -tt
C. -4
D. -i
Related Mcqs:
- What command is used to assign only read permission to all three categories of the file’letter’ ?
- A. chmod u + r, g + r, o – x letter B. chmod ugo = r letter C. chmod a – rw letter D. chmod go + r letter...
- In which tcp_wrappers file can you specify to allow all connections from all hosts ?
- A. /etc/hosts.allow B. /etc/hosts.deny C. /etc/hosts D. /etc/tcp.conf...
- What command is used to remove a file ?
- A. del B. mv C. rm D. remove...
- What file specifies the order in which to use specified name services ?
- A. /etc/services B. /etc/nsorder C. /etc/nsswitch.conf D. /etc/hosts...
- How could you install the file ipchains-1.3.9-5.i386.rpm ?
- A. rpm -qip ipchains B. rpm -Uvh ipchains C. rpm -i ipchains* .i386.rpm D. rpm -e ipchains-1.3.9-5.i386.rpm...
Recent Comments